Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
17-07-2022 15:23
Static task
static1
Behavioral task
behavioral1
Sample
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe
Resource
win7-20220414-en
General
-
Target
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe
-
Size
268KB
-
MD5
191e32c98a540b72ebddf3dfbb3436a4
-
SHA1
f812053fbb4dd3bb776b70b88a3bc494de7f9177
-
SHA256
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1
-
SHA512
971c569e0389d9bd356200e3b1a9c8a644d5c09998108b9decf188c67143406850e58f64ba89c5be2fb307754050e997176352ebbd44ee51e81493075363f7fb
Malware Config
Extracted
gootkit
2410
clean.eco2plastic.com
ecos.eco2environmental.biz
trkajtools.com
quoteszones.com
mobileinstore.co.uk
-
vendor_id
2410
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1688 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mstsc.exepid process 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe 1380 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exepid process 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exepid process 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exemstsc.execmd.exedescription pid process target process PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1864 wrote to memory of 1380 1864 51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe mstsc.exe PID 1380 wrote to memory of 1688 1380 mstsc.exe cmd.exe PID 1380 wrote to memory of 1688 1380 mstsc.exe cmd.exe PID 1380 wrote to memory of 1688 1380 mstsc.exe cmd.exe PID 1380 wrote to memory of 1688 1380 mstsc.exe cmd.exe PID 1688 wrote to memory of 1684 1688 cmd.exe attrib.exe PID 1688 wrote to memory of 1684 1688 cmd.exe attrib.exe PID 1688 wrote to memory of 1684 1688 cmd.exe attrib.exe PID 1688 wrote to memory of 1684 1688 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\mstsc.exeC:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7104051.bat" "C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe""3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\51c54ed3a0a1fd2576cecf974d189043f42355c1c97ba761d88a0885e732f4f1.exe"4⤵
- Views/modifies file attributes
PID:1684
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5582bb6b38598bcd1ffa656307168854c
SHA15271c444472914810b49e92ada9a5b50cf40b670
SHA25643568d81a40e8ba7eb5d1dd92186609d47268a3c44a193afb0f099f9c60320ad
SHA5123e3199b9b6014a47a573558cdfe6b24c600d0d4e32c91ff7ae44761d92e38b1d398aa6c9776e47d6fe94a5d0b29821c817c7bfb4cef3c6925ab399d3d3085446